meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, April 25th, 2022

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 25 April 2022

⏱️ 5 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Analyzing Word Phish; Targeting Roku; ECDSA JWT PoC; IBM DB2 Expat Vuln; Jira Vuln

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, April 25th, 2020 edition of the Sansonet Storms and StormCast. My name is Johannes Ulrich and I'm recording from Jacksonville, Florida.

0:14.4

Got two interesting diaries this weekend, first one by DDA, looking at a fishing word document that for a change did not

0:23.6

contain any macros the DA walks you through how to use his famous tools in order to

0:30.5

first identify that there are no macros and then secondly identify the fishing URL embedded in the document. The big advantage here

0:40.8

is these are all simple, fast command line tools, so running them takes literally no time, and

0:48.3

of course, no danger here of actually opening a malicious document Word to figure out what it is doing.

0:57.5

So for anybody here having to analyze a lot of Word documents, you've got a quick step-by-step

1:03.8

plan here on how to deal with those documents.

1:09.0

And do you own a streaming device?

1:12.1

Well, probably everybody has some kind of Rokuplex, Apple TV order like.

1:18.6

Guy took a look at various scans looking for Roku devices and attempting to either get to confidential information or to look for

1:32.6

exposed and vulnerable devices that could potentially be exploited. These devices should

1:38.4

obviously never be exposed to the internet and here I said it yet again. The problem here is often that NetHacker essentially just wants to use your subscriptions

1:50.3

in order to watch TV shows, and of course, with various streaming services, clamping down

1:58.4

on sharing of passwords. It may find you locked out of various

2:04.9

services yourself.

2:08.0

Well, while we're still waiting for the Microsoft RPC vulnerability to actually be exploited,

2:15.0

we do have for you now even more proof of consulate exploits for CVE

2:21.4

2022, 21-449. This is the elliptic curve DSA, a signature of vulnerability that I talked

2:30.1

about last week. And well, on Friday, I mentioned that there is a proof of concept

2:36.3

exploit that impersonated a web server. We now also have a proof of concept exploit that

2:43.6

shows how this vulnerability can be used to fake JWT token of signatures.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.